a real time approach for secure text ... using of image and video with technique of encryption...

8
International Journal of Scientific & Innovative Research Studies ISSN : 2347-7660 (Print) | ISSN : 2454-1818 (Online) Vol (5), No.7 July, 2017 IJSIRS 21 A REAL TIME APPROACH FOR SECURE TEXT TRANSMISSION USING VIDEO Jyoti Uppar, MTech Student, VTU Extension Centre, UTL Technologies Ltd, Bangalore. Hemanth Kumar K S , Assistant Professor, VTU Extension Centre, UTL Technologies Ltd, Bangalore Dr Siva Yellampalli, Principal, VTU Extension Centre, UTL Technologies Ltd, Bangalore ABSTRACT Picture and video are most simple form of transmitting the data. By using of image and video with technique of encryption it’s possible to secure information safely to the network or server. Here following the basic building module of Pixel mapping method. The video are separated into frames and those frames are ordering into chronological form to store it. Those frames are organized into RED, BLUE and GREEN levels. The taken one pixel equal to 8bit means then total range of this value is 255.In this process information are placing in opposite of corner of frames. Finally arranging the frames in video, it is look same as input video only. Key words: Cryptography, Stenography, Pixel Mapping, Public Key

Upload: lylien

Post on 15-Mar-2018

215 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: A REAL TIME APPROACH FOR SECURE TEXT ... using of image and video with technique of encryption it’s possible to secure information safely to the network or server. Here following

International Journal of Scientific & Innovative Research Studies ISSN : 2347-7660 (Print) | ISSN : 2454-1818 (Online)

Vol (5), No.7 July, 2017 IJSIRS 21

A REAL TIME APPROACH FOR SECURE TEXT TRANSMISSION USING VIDEO

Jyoti Uppar,

MTech Student,

VTU Extension Centre,

UTL Technologies Ltd,

Bangalore.

Hemanth Kumar K S ,

Assistant Professor,

VTU Extension Centre,

UTL Technologies Ltd, Bangalore

Dr Siva Yellampalli,

Principal,

VTU Extension Centre,

UTL Technologies Ltd,

Bangalore

ABSTRACT

Picture and video are most simple form of transmitting the data. By using of image and video with

technique of encryption it’s possible to secure information safely to the network or server. Here following

the basic building module of Pixel mapping method. The video are separated into frames and those frames

are ordering into chronological form to store it. Those frames are organized into RED, BLUE and GREEN

levels. The taken one pixel equal to 8bit means then total range of this value is 255.In this process

information are placing in opposite of corner of frames. Finally arranging the frames in video, it is look

same as input video only.

Key words: Cryptography, Stenography, Pixel Mapping, Public Key

Page 2: A REAL TIME APPROACH FOR SECURE TEXT ... using of image and video with technique of encryption it’s possible to secure information safely to the network or server. Here following

International Journal of Scientific & Innovative Research Studies ISSN : 2347-7660 (Print) | ISSN : 2454-1818 (Online)

22 | Vol (5), No.7 July, 2017 IJSIRS

INTRODUCTION

This frame movement can be easily identified with a

help of the objects or animated things in frames [1].

But normal eye it is difficult to find out the pixel

changes in frame because pixel are not visible scale

and rest of pixel are constant stage [2].

If we consider any video will be same or different

types of frames and binding into the single video.

General calculation of each frame rate equal to the

25frames, these frames are confine into 1sec.If video

is 1minute the simple calculation 1second equal 25

frames means 60seconds multiple by 25frames. By

using converted video into frames can be filled the

data into frame with help of Stenography. Why we

considering stenography techniques why not

Watermark techniques. The stenography is more

accurate and efficient compare to Watermark

techniques [3][4][5]. Watermark main drawback is it

will consume more time following the processing

steps. In given long time it convert only small

amount of data. Stenography method considering

the pixel mapping technique and algorithm steps are

less compare to the watermark technique [7][8].

I. IMAGE TRANSMISSION USING

CRYPTOGRAPHY

Cryptography algorithm steps are shown in Fig 1.The

input of data is video, this video format may

anything according to ng that make sure in

development of extension video format.

Step 1: Upload video on application of video loading

function and convert video to frames.

Step 2: Write input text data into frame in sequential

order.

Step 3: If already text data is available on frame

means have a option to overwrite information or

keep as it is..

Step 4: Check condition if want to replace then

repeat step 3 or not required to write data on

already present in the frame.

Step 5: Store remaining frames into .AVI file.

Convert video

into frames

Upload

Video

Write TEXT DATA

to frames

Existed TEXT

DATA

for frames to

replace

Frame

to .AVI file

No

Yes

Figure 1: Block diagram of Cryptography

CRYPTOGRAPHY

Cryptography is design of high hidden the data while

transforming into the other side without any issues

in text data.

The entire process can be done with Matlab

code for batter result. In this case encryption

method and text placing into the video converted

frames [9]. As shown in Fig 1, the full bundle video is

converting into frames with help of video converting

module in Matlab code and different dimension of

frame size. The message text is inserted into frame

and divided into two bits of each. Now we need to

update only two pixels per image[11]. Each text is

string and converted into ASCII value then sizes

become a one byte or 8 bits in image. In this

algorithm to signify the one character required four

pixel to store particular character. If consider

grassman law 2:1 weighage of green colour

remaining both of colour are 41 percent in pixel

requirement [12]. The green colour is constant

remaining red and blue will as per the colour

modification.

Page 3: A REAL TIME APPROACH FOR SECURE TEXT ... using of image and video with technique of encryption it’s possible to secure information safely to the network or server. Here following

International Journal of Scientific & Innovative Research Studies ISSN : 2347-7660 (Print) | ISSN : 2454-1818 (Online)

Vol (5), No.7 July, 2017 IJSIRS 23

The rule for the writing text into the frame number

of character (i) should be less then the number of

frames (j).

Video encoding steps are listed below:

a) Modification of segment patter into text, here

distributing group like 2, 4 or 8bits.

b) Test data insertion can implement in alternate

frame to make more secure of data.

c) The text data is encoded with green, red and

blue layer in systematic manner, who inserted

person can only make data encoding.

Cryptography is the procedure one can share and

many user can be utilizes of to share information it

may be in the form of text or frame picture with safe

mode. The other side user will receive data like

garbage string and its highly impossible to

understand the information..

The encryption key generator is used to generate the

encryption key and also public key as shown in

below block diagram. Thus encryption key

information is encrypted with help of encryption.

Finally this result is sent to the particular receiver as

shown in Fig 2.

EncryterInformationEncrpted

Information

Public KeyEncrypt

Key Generator

Figure 2: Cryptography Encryption

If, consider the receiver end of the Cryptography

Decryption is used to brief the original information

compare to the video file by using public key ,this

processor will held on transmitter side. If any other

user wants to extract the information then they

must have the proper public key for particular video

file information content. Otherwise it won’t be able

to get real information so here public key if working

as an effective operation as shown in Fig 3.

Decrypter

Key Generator

Encrpted

Information

Decrpted

Information

Public Key

Figure 3: Cryptography Decryption

STEGANOGRAPHY

The steganography expression adapted by Greek

dictionary in steganos, it says that disclose and

graphy means representation like diagram or

plotting .The most advantage of steganography is

hidden the data thought out the network

communication without any leakage of data [4].

Page 4: A REAL TIME APPROACH FOR SECURE TEXT ... using of image and video with technique of encryption it’s possible to secure information safely to the network or server. Here following

International Journal of Scientific & Innovative Research Studies ISSN : 2347-7660 (Print) | ISSN : 2454-1818 (Online)

24 | Vol (5), No.7 July, 2017 IJSIRS

Sender

EmbeddedStego

Key

Cover Medium

Stego

Key

Stego

Medium

Extract

Receiver

Send to

Figure 4: Block diagram of steganography

Steganography algorithm will change the given input

text characteristics structure so that it cannot be

possible to re-collect the normal eye into original

text format. This steganography consists of three

main processing steps Text data, embedded

technique and Stego key, but here considering RSA

algorithm .The block diagram for steganography as

shown in Fig 4. The aspects of steganography are

classified into different type’s capacity, defense and

robustness and it’s required to achieve quality of

model. Capacity represent the total amount of text is

in secured, Defense – this means not capable to

detect the original information with full safe.

Robustness - is the quantity of changes the stego

standard can hold out before a detector can destroy

the secreted information.

The difference between cryptography and

steganography is a significant one, and is detailed in

below table.

Table 1: Cryptography Vs Steganography

Techniques Steganography Cryptography

Definition Steganography

defines cover text

Focuses on keeping

contents of a message

secret.

Key Optional Necessary

Carrier Any digital media Usually text based

Visibility Never Always

Security

Services

Offered

Confidentiality,

authentication

Confidentiality,

availability, data

integrity, non-

repudiation

Attacks It is broken when

attacker detects

the

steganography

has been used

known as

Steganalysis

It is broken when

attacker can read the

secret message

known as

Cryptanalysis

Result Stego file Cipher text

Page 5: A REAL TIME APPROACH FOR SECURE TEXT ... using of image and video with technique of encryption it’s possible to secure information safely to the network or server. Here following

International Journal of Scientific & Innovative Research Studies ISSN : 2347-7660 (Print) | ISSN : 2454-1818 (Online)

Vol (5), No.7 July, 2017 IJSIRS 25

RIVEST SHAMIR ADLEMAN FOR

PUBLIC KEY ENCRYPTION

The RSA algorithm is also called secure public key

generation technique or asymmetric cryptography

algorithm and most popular method. Basically

RSA is used for encrypt and decrypt text data.

Keys are classified into two types:

a) Public Key

b) Private Key

Public Key – is known as asymmetric Key algorithm.

Private Key – is called as a Secrete Key.

Step 1: Select value for example p = 3 and q = 11

Step 2: Calculate n = p * q = 3 * 11 = 33

Step 3: Calculate φ(n) = (p - 1) * (q - 1) = 2 * 10 = 20

Step 4: Select e such that 1 < e < φ(n) and e and φ (n)

are co-prime. Let e = 7

Step 5: Calculate a value for d is (d * e) % φ(n) = 1.

One solution is d = 3 [(3 * 7) % 20 = 1]

Step 6: Public key is (e, n) => (7, 33)

Step 7: Private Key is (d, n) => (3, 33)

Step 8: The encryption of m = 2 is c = 27 % 33 = 29

Step 9: The decryption of c = 29 is m = 293 % 33 = 2.

We have evaluated video encryption

scheme with respect to three parameters: security

level, encryption speed, and encrypted MPEG stream

size. In Table 2 the comparative results of the

encryption algorithms is done that is DES, AES and

RSA. The speed of all three algorithms is high.

Whereas the security level of the RSA and AES is high

as compared to the DES.

In this table shows comparison of the video

encryption design. We have to figure out based on

these three parameters.

Table 2: Comparison of DES, ASE and RSA algorithm

Com

Plex

ity

Mem

ory

cons

traint

Key

Type

Key

Len

gth

(in

bits)

Key

Spa

ce

Size

(in

bits)

Secu

rity

level

DES Com

Plex

ity

NA Priva

te

Kay

56

bits

(sub

key

-48

bits)

256

Low

AES Comp

lexity

Very

Low

Priva

te

Kay

128

bits

(sub

key

-

196bits)

2128

, 2192

, 2256

High

RSA Simple NA Pub Variable Vari High

Page 6: A REAL TIME APPROACH FOR SECURE TEXT ... using of image and video with technique of encryption it’s possible to secure information safely to the network or server. Here following

International Journal of Scientific & Innovative Research Studies ISSN : 2347-7660 (Print) | ISSN : 2454-1818 (Online)

26 | Vol (5), No.7 July, 2017 IJSIRS

lic

Kay

able

PERFORMANCE AND RESULTS

The main performance of this work is representing

the design and implementation of the module. Since

the Steganography is more complex part in the

individual steganography. Hence this operates at

high speed inserting into frames and reduce the

lossless data.

The below figure represent the main GUI page. This

represent the input video into number of frames and

given input making into to not understandable text

data is called as embedded of text and finally

showing the encrypted message but destination side

video is same as original video but size of video and

text data inserted into frames.

Figure 5: Result of video file processing by using RSA algorithm

CONCLUSION

The most important feature of this project proposed

work is, a crucial role of transmitting the information

in image or video file with effectively and efficiently.

Another important characteristic is not visible to

normal human eye. Only such case can be view

original message, if person had a private key and list

of rule explained above with decrypt technique. This

method present the securing the information,

misuse of data and protect from unknown persons.

With combination of RSA, cryptography and

steganography method will make safer and top

secure.

REFERENCES

1. Neil F. Johnson, Sushil Jajodia, “Exploring

Steganography: Seeing the Unseen”, IEEE,

Feb1998, pp. 26-34.

2. “A real time approach for secure text

transmission using video cryptography” by

Viral Metaliya, Dipak Jain and Ravin

Sardhara in

3. conference on Communication Systems and

Network Technologies (CSNT) ISBN 978-1-

4799-3069-2.

4. *NeetuSettia. “Cryptanalysis of modern

Cryptography Algorithms”. International

Journal of Computer Science and

Technology. December 2010.

Page 7: A REAL TIME APPROACH FOR SECURE TEXT ... using of image and video with technique of encryption it’s possible to secure information safely to the network or server. Here following

International Journal of Scientific & Innovative Research Studies ISSN : 2347-7660 (Print) | ISSN : 2454-1818 (Online)

Vol (5), No.7 July, 2017 IJSIRS 27

5. Dr. R. Sridevi, Vijaya Lakshmi Paruchuri, K.S.

Sadasiva Rao, “Image Steganography

combined with Cryptography”,International

Journal of Computers & Technology, ISSN:

22773061, Vol.9, July 2013, pp. 976-984.

6. Lokesh Kumar, “Novel Security Scheme for

Image Steganography using Cryptography

Technique”, International Journal of

Advanced Research in Computer Science

and Software Engineering, ISSN: 2277 128X

Vol.2, April 2012, pp. 143-146.

7. “A real time approach for secure text

transmission using video cryptography” by

Viral Metaliya, Dipak Jain and Ravin

Sardhara in

8. conference on Communication Systems and

Network Technologies (CSNT) ISBN 978-1-

4799-3069-2.

9. Mihir H Rajyaguru, “Crystography -

Combination of Cryptography and

Steganography with Rapidly Changing

Keys”, International Journal of Emerging

Technology and Advanced Engineering,

ISSN: 2250-2459, Vol.2, October 2012, pp.

329-332.

10. H.Al-Barhmtoshy, E.Osman and M.Ezzaand,

“A Novel Security Model Combining

Cryptography and Steganography”,

Technical Report, 2004, pp. 483-490.

11. S.Ashwin, J.Ramesh, K.Gunavathi, “Novel

and Secure Encoding and Hiding Techniques

Using Image Steganography:

12. Adnan M. Alattar, “Reversible watermark

using the difference expansion of a

generalized integer transform”, IEEE Trans.

On Image Processing, vol. 13, no.8, Aug,

2004. [10] Avcibas, N. Memon, and B.

Sankur “ Steganalysis using image quality

metrics”, IEEE Trans. IP, VOL. 12, PP.221-

229, Feb. 2003

13. Dipesh G. Kamdar, Dolly Patira and Dr. C. H.

Vithalani hiding using cryptography and

steganography” ISSN: 2277-1581

14. A. Joseph Raphael, Dr. V.Sundaram,

“Cryptography and Steganography-A

Survey, International Journal of Computer

and Technology Applications”, ISSN: 2229-

6093, Vol.2 (3), 2010, pp. 626-630.

15. Niu Jiping, “Image encryption algorithm

based on rijndael S-boxes” in IEEE applied

International conference on computational

intelligence and security 978-0-7695-3508-

1\08, 2008.

16. Punita Meelu ,“AES Asymmetric key

cryptographic system” in international

journal of information technology

andknowledge management, volume 4,

113-117, 2011.

17. N.V Rao, J.TL Philjon, “Metamorphic Crypto-

A Paradox between Cryptography and

Steganography using Dynamic

18. Encryption”, IEEE Xplore International

Conference on Recent Trends in

Information Technology, June 2011, pp.

217-222.

19. Mehdi Hussain, Mureed Hussain, “A Survey

of Image Steganography Technique”,

International Journal of Advanced

20. Science and Technology, Vol. 54, 2013, pp.

113-124.

21. B. Subramanan, “Image encryption based

on AES key expansion” in IEEE applied

second international conference

22. on emerging application of information

technology, 978-0-7695-4329-1/11, 2011.

23. Khalil Challita, Hikmat Farhat, “Combining

Steganography and Cryptography: New

Directions”, International Journal on New

Computer Architectures and their

Applications (IJNCAA), ISSN: 2220-9085, Vol.

1(1), 2011.

Page 8: A REAL TIME APPROACH FOR SECURE TEXT ... using of image and video with technique of encryption it’s possible to secure information safely to the network or server. Here following

International Journal of Scientific & Innovative Research Studies ISSN : 2347-7660 (Print) | ISSN : 2454-1818 (Online)

28 | Vol (5), No.7 July, 2017 IJSIRS

Copyright © 2017, Jyoti Uppar, Hemanth Kumar K S and Dr Siva Yellampalli. This is an open access refereed article distributed under the creative common attribution license which permits unrestricted use, distribution and reproduction in any medium, provided the original work is properly cited.